Networking category: 4555 books

Cover of Information Security

Information Security

20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings

by
Language: English
Release Date: November 13, 2017

This book constitutes the refereed proceedings of the 20th International Conference on Information Security, ISC 2017, held in Ho Chi Minh City, Vietnam, in November 2017.  The 25 revised full papers presented were carefully reviewed and selected from 97 submissions. The papers are organized...
Cover of Network Hardening

Network Hardening

An Automated Approach to Improving Network Security

by Massimiliano Albanese, Lingyu Wang, Sushil Jajodia
Language: English
Release Date: July 8, 2014

This Springer Brief examines the tools based on attack graphs that help reveal network hardening threats. Existing tools detail all possible attack paths leading to critical network resources. Though no current tool provides a direct solution to remove the threats, they are a more efficient means...
Cover of Bluetooth Low Energy: The Developer's Handbook
by Robin Heydon
Language: English
Release Date: October 26, 2012

The First Complete Guide to Bluetooth Low Energy: How It Works, What It Can Do, and How to Apply It   A radical departure from conventional Bluetooth technology, Bluetooth low energy (BLE) enables breakthrough wireless applications in industries ranging from healthcare to transportation. Running...
Cover of How to Measure Anything in Cybersecurity Risk
by Douglas W. Hubbard, Richard Seiersen
Language: English
Release Date: July 25, 2016

A ground shaking exposé on the failure of popular cyber risk management methods How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques that help you fill the holes and ramp up security....
Cover of Official (ISC)2 Guide to the CSSLP
by Mano Paul
Language: English
Release Date: April 19, 2016

As the global leader in information security education and certification, (ISC)2 has a proven track record of educating and certifying information security professionals. Its newest certification, the Certified Secure Software Lifecycle Professional (CSSLP) is a testament to the organization's ongoing commitment to information and software security
Cover of Googling Security

Googling Security

How Much Does Google Know About You?

by Greg Conti
Language: English
Release Date: October 10, 2008

What Does Google Know about You? And Who Are They Telling?   When you use Google’s “free” services, you pay, big time–with personal information about yourself. Google is making a fortune on what it knows about you…and you may be shocked by just how much Google does know. Googling Security...
Cover of The Internet of Things

The Internet of Things

Living in a connected world

by
Language: English
Release Date: May 2, 2017

Extensive advertising and review coverage in the leading business and IT media, and direct mail campaigns targeting IT professionals, libraries, corporate customers and approximately 70,000 BCS members.
Cover of Database Nation

Database Nation

The Death of Privacy in the 21st Century

by Simson Garfinkel
Language: English
Release Date: December 4, 2000

Fifty years ago, in 1984, George Orwell imagined a future in which privacy was demolished by a totalitarian state that used spies, video surveillance, historical revisionism, and control over the media to maintain its power. Those who worry about personal privacy and identity--especially in this day...
Cover of Cybercrime and Espionage

Cybercrime and Espionage

An Analysis of Subversive Multi-Vector Threats

by Will Gragido, John Pirc
Language: English
Release Date: January 7, 2011

Cybercrime and Espionage provides a comprehensive analysis of the sophisticated patterns and subversive multi-vector threats (SMTs) associated with modern cybercrime, cyber terrorism, cyber warfare and cyber espionage. Whether the goal is to acquire and subsequently sell intellectual property from...
Cover of Behold a Pale Farce

Behold a Pale Farce

Cyberwar, Threat Inflation, & the Malware Industrial Complex

by Bill Blunden, Violet Cheung
Language: English
Release Date: April 17, 2014

This book presents a data-driven message that exposes the cyberwar media campaign being directed by the Pentagon and its patronage networks. By demonstrating that the American public is being coerced by a threat that has been blown out of proportion—much like the run-up to the Gulf War or the global...
Cover of How Real Estate Agents Succeed In… Organizing Their Client List
by Erin N. Harrison
Language: English
Release Date: September 19, 2013

As a Real Estate Agent You Need to be Organized, and Your Client List is the 1st Place to Start Get Organized. Get More Business! Real Estate Agents Who Are Organized Have More Business Than Those Who Aren't Here's the first place you can start. ˃˃˃ Your Client List Imagine...
Cover of Managing Information Risk

Managing Information Risk

A Director's Guide

by Stewart Mitchell
Language: English
Release Date: July 28, 2009

This pocket guide addresses the scope of risks involved in a modern IT system, and outlines strategies for working through the process of putting risk management at the heart of your corporate culture. 
Cover of The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons to GenX and Baby Boomers, Computer Security, Information Theft, US-CERT Risk Factors, Edward Snowden
by Progressive Management
Language: English
Release Date: October 3, 2016

This important report has been professionally converted for accurate flowing-text e-book format reproduction. Cyber security experts agree that insider threats are and will continue to be a threat to every organization. These threats come from trusted co-workers who, for one reason or another, betray...
Cover of Digital Debates: CyFy Journal Volume 3 (2016)
by Global Policy
Language: English
Release Date: January 3, 2017

Debates around internet policy have taken centre stage in domestic politics and international relations alike. While national debates are shaped by local priorities, politics and contextual ambitions, cyber diplomacy differs from traditional diplomacy in two important respects. First, the stakeholders...
First 75 76 77 78 79 80 8182 83 84 85 86 87 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy